Sciweavers

1906 search results - page 251 / 382
» Data Privacy
Sort
View
CCS
2010
ACM
15 years 7 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
ESORICS
2009
Springer
15 years 7 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
CCS
2008
ACM
15 years 6 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ISI
2010
Springer
15 years 1 months ago
Social media and social reality
Social Media provide an exciting and novel view into social phenomena. The vast amounts of data that can be gathered from the Internet coupled with massively parallel supercomputer...
William N. Reynolds, Marta S. Weber, Robert M. Far...
CCS
2010
ACM
15 years 1 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...